Skip to content
AndroidMessengerCritical

Android SMS (mmssms.db)

Android Telephony provider stores SMS and MMS in a single SQLite database accessible via content providers, often recoverable even after app reinstall.

artifact_type: mobile_android_sms

Where to find it

Default filesystem paths and registry locations. Collect these with your preferred live-response or disk-image tooling.

  • $/data/data/com.android.providers.telephony/databases/mmssms.db

Forensic significance

Common scenarios in which this artifact becomes decisive evidence.

  • Threatening or harassing message content
  • 2FA bypass investigation — SMS interception
  • Smishing — link delivery to victim

Tools that parse it

unJaena AI and other DFIR tools commonly used to extract evidence from this artifact.

unJaena AI
Cellebrite UFED
ALEAPP
Autopsy

Related artifacts

Stop parsing artifacts by hand

unJaena AI ingests disk images, live-response output, and mobile backups, then automatically correlates every artifact on this page — and 200+ more — into an investigator-ready timeline.

Try unJaena AI